AdaptixC2 Uncovered:
Capabilities, Tactics & Hunting Strategies
Published on
Published on
Published on
Oct 9, 2025
Oct 9, 2025
Oct 9, 2025




AdaptixC2 is a command-and-control (C2) framework designed to be simple, flexible, and easily customizable. Unlike larger C2 platforms that can be complex and heavy, its lightweight design makes it easier for attackers to deploy and adapt across different environments.
The framework is modular, meaning its features can be extended or modified without requiring a complete rewrite of the system. It supports the basic functions you'd expect in a C2 tool, such as running commands on a compromised machine, transferring files, injecting into processes, setting up persistence, and gathering system information. Communication usually happens through HTTP or HTTPS, which helps it blend in with normal web traffic.
Because it's open-source, AdaptixC2 can be studied and modified by anyone, from researchers and defenders to red teamers and attackers. For defenders, it's a good example of how custom or lesser-known C2 frameworks are being used to avoid detection.

Key Takeaways
Framework: AdaptixC2 demonstrates that lightweight, open-source C2 frameworks can deliver full-featured capabilities, including multi-protocol communication, advanced evasion techniques, and modular extensibility through BOF execution systems.
Real-World Deployment Scale: The discovery of 102 active servers across multiple countries and hosting providers indicates widespread operational use, not just research or testing activities, with attackers leveraging legitimate cloud infrastructure to blend malicious operations.
Multi-Protocol Threat Model: The beacon's support for HTTP, SMB, and TCP protocols creates multiple attack vectors that require comprehensive network monitoring, as attackers can adapt communication methods based on target environment restrictions.
Detection Challenges: Dynamic API resolution, custom hash-based lookups, and RC4 encryption make traditional signature-based detection ineffective, requiring behavioral analysis and network pattern recognition for reliable identification.
Operational Security Features: Built-in capabilities like kill dates, working hours restrictions, and configurable sleep intervals demonstrate that even lightweight frameworks incorporate sophisticated operational security measures for long-term persistence.
Lateral Movement Capabilities: SMB named pipe communication and multi-hop pivoting functionality transform each infected system into a potential stepping stone for deeper network penetration, requiring network segmentation as a critical defense.
Open Source Intelligence Impact: Exposed directories with deployment scripts, configuration files, and compiled agents offer useful insight into attacker operations and support better countermeasures.
Initial Discovery via AttackCapture™
AttackCapture™ is Hunt.io's system for spotting and indexing open directories left exposed online by attackers. It collects these directories, extracts the files inside, and tags them by malware family, tool name, or known behavior. This helps analysts connect exposed files with active infrastructure and see how different frameworks, like AdaptixC2, are being used in real operations.
For our research on AdaptixC2, the first step was filtering results by the AdaptixC2 tag. This quickly revealed servers linked to the framework. We then focused on hosts with open directories, since these often hold payloads, configuration files, or C2 web panels.
Reviewing these directories gave us a clearer view of how AdaptixC2 functions and where it's being deployed. Findings pointed to servers across multiple providers and countries, including Kazakhstan, Ireland, and Switzerland, with ports such as 80, 8000, and 14531 frequently observed.

Some exposed open directories held files from a few megabytes up to more than 70 MB. These often include payloads, configuration files, or control pages that reveal how the server is set up.
While analyzing one of the AdaptixC2 servers (85.202.193[.]88), we found
.ssh/authorized_keys
(possible access keys), shell histories (
.bash_history
,
.history
,
nohup.out
), and profile files that show past commands and environment details.
We also saw deployment traces such as Dockerfile, dist/, server.log, and install scripts (
pre_install_linux_all.sh
,
pre_install_macos_client.sh
) that show how the framework was built and run.

The exposed directory also contained compiled agents and traces of day-to-day use. User and system files like
.bash_history
,
.bashrc
,
.profile
,
.wget-hsts
, and
.sudo_as_admin_successful
reveal environment setup and past activity on the host. We also found multiple compiled payloads (
agent.x64.bin
,
agent.x86.dll/.exe
,
agent.smb.exe/.dll
,
agent_noheader.exe
,
svc_agent.*
) and encoded forms (
agent.base64
,
agent.hex
).

Investigation and Analysis
Our review of the collected AdaptixC2 files and code revealed several agent components that shed light on the framework’s client-side behavior. The analysis centered on the beacon, the malware responsible for establishing command and control on infected systems, where we identified seven key capability areas that define how AdaptixC2 operates in the wild.
Multi-Protocol Communication
The beacon implements three different communication methods to establish command and control channels with remote operators. The HTTP method uses standard web traffic with custom headers and URIs to blend in with normal browsing activity, while supporting multiple backup servers for redundancy.
For internal network operations, it creates SMB named pipes between infected machines, allowing commands to pass through compromised systems without generating external traffic. The TCP option provides direct socket connections when HTTP traffic is blocked, listening on configurable ports with a custom protocol implementation.
Advanced Evasion Techniques
The malware avoids static API imports by resolving Windows function addresses at runtime using custom hash-based lookups, making signature detection significantly harder. It supports multiple deployment methods, including standalone executables, Windows services, DLL injection, and shellcode execution, providing flexibility to bypass different security controls and persistence mechanisms.

System Administration Capabilities
The beacon provides comprehensive remote administration through an extensive command set that includes complete file system operations like directory listing, file reading, copying, and deletion. It also offers process management capabilities, allowing attackers to list running applications, terminate processes, and execute new programs with full output capture for interactive system control.

File Transfer Functionality
The malware implements robust file transfer capabilities supporting both uploads and downloads through encrypted channels. Downloads use a chunked transfer system that breaks large files into smaller pieces with resume capability, helping avoid network monitoring alerts while ensuring reliable transfer completion even over unstable connections.

Networking and Lateral Movement
The beacon includes sophisticated tunneling and pivoting functionality that transforms infected systems into proxy servers for deeper network penetration. It implements TCP and UDP port forwarding to route traffic through compromised machines and supports multi-hop connections where commands pass through multiple infected systems to reach targets that cannot directly communicate with external C2 servers.
BOF Execution System
The malware features a Beacon Object File system that allows loading and executing additional modules without recompilation. This modular architecture provides loaded modules with a complete API for system interaction, memory management, and output handling, essentially creating a platform for arbitrary code execution and functionality extension.

Configuration Management
The beacon includes several operational security features designed for long-term persistence and stealth operations. It supports kill dates for automatic termination, working hours restrictions to blend with normal business operations, and configurable sleep intervals with random jitter to evade network monitoring. All communications use RC4 encryption with session-specific keys to protect command and control traffic from analysis.

Infrastructure Discovery and Hunting
After understanding the beacon's internal functions, we shifted focus to the infrastructure that supports it. Using configuration profiles and live telemetry from Hunt.io, we mapped active AdaptixC2 servers and analyzed how they operate across hosting providers.
Configuration Profile Discovery
During our investigation, we found a configuration profile for an AdaptixC2 teamserver that gave us several useful leads. The profile shows the server listening on 0.0.0.0:4321 with an /endpoint path, default credentials, certificate names (server.rsa.crt and server.rsa.key), and a list of enabled extenders (HTTP, SMB, TCP, Gopher). It also includes token lifetimes, a custom server header, version string (v0.8), and templates for callbacks such as new agent registration or file downloads.

Infrastructure Fingerprinting
These details are valuable for tracking infrastructure. The ports and endpoints guide network searches, certificate names reveal file locations in exposed webroots, and headers or version strings provide a fingerprint to link multiple hosts. We exported these indicators into Hunt.io's index and used them to map related AdaptixC2 servers across the internet.
HuntSQL™ Query for AdaptixC2 Detection
We noticed the HTTP response header Server: AdaptixC2, which is a very useful fingerprint. Because that header is returned by the server, we can pivot from any host that shows it: search web server headers, proxy/WAF logs, passive DNS, or service scans for matches, and pull associated files and connection logs.
In this case, we crafted a HuntSQL™ query searching for HTTP headers containing the string %AdaptixC2%, allowing us to identify servers returning that value in their responses.
SELECT
ip
FROM
httpv2
WHERE
http.headers.bytes.content LIKE '%AdaptixC2%'
AND timestamp gt '2025-09-20'
Copy
The results revealed 56 active hosts returning the Server: AdaptixC2 header, confirming live infrastructure tied to the framework. Several of these servers were hosted on well-known providers, suggesting attackers rely on commercial cloud environments to run their C2 operations.

This query returns hosts matching the AdaptixC2 pattern and can be extended for certificate or JARM correlation, helping uncover additional servers with shared infrastructure traits. Building on these results, we expanded the search across Hunt.io’s dataset to identify broader AdaptixC2 activity and confirm patterns observed in earlier findings.
Automated Hunting
Filtering Hunt.io's C2 telemetry for the AdaptixC2 tag surfaced 102 active servers across several hosting providers. Most were hosted on Hivelocity, OVHcloud, and Constant Company, showing that attackers rely on legitimate cloud infrastructure to hide their activity among regular business traffic. Counts reflect AttackCapture™ and HuntSQL™ results collected between August and September 2025.
Port analysis confirmed that 4321 is the default listening port for AdaptixC2 teamservers, with 6869 and 53362 seen in custom setups or parallel listeners. These findings reinforce the configuration data seen earlier and provide reliable starting points for detection and blocking.

With this infrastructure mapped, the next step was to explore how analysts can pivot within Hunt.io to uncover related servers, shared certificates, and broader connections across the same attacker ecosystem.
Pivoting and Correlation in Hunt.io
Once analysts obtain this AdaptixC2 infrastructure listing in Hunt.io, they can pivot directly from the displayed fields to expand the investigation and uncover related infrastructure controlled by the same threat actor. For example, by pivoting from one of the identified IPs - 23.227.203[.]190 - analysts can explore provider details, risk scores, and open ports to understand how this C2 node fits within the broader AdaptixC2 network.

The Info tab shows provider details, risk level, and open ports. Analysts can confirm if the host is active, review services like TLS or SSH, and check non-standard ports such as 4321 that often appear in AdaptixC2 deployments.
The Domains tab lists hostnames tied to the IP. This helps reveal automatically generated subdomains or control panels that attackers might use for redirection or management.
In the Associations tab, Hunt.io displays all linked SSL certificates, keys, and configuration files. Matching certificates across several IPs is one of the quickest ways to connect multiple C2 servers operated by the same group. In this example, identical certificate fingerprints were found across several Hivelocity IPs, confirming shared infrastructure within the same AdaptixC2 cluster.

The Pivots view brings these findings together. It lists hashes, headers, and TLS fingerprints that can be queried or expanded through HuntSQL™. Analysts can search by SSL fingerprint, header hash, or JARM signature to uncover other hosts with the same traits. This pivoting ability helps build a clear map of how attackers distribute and reuse their C2 nodes.

Timeline and IOC Correlation
The Timeline / IOCs view helps analysts understand how the AdaptixC2 infrastructure evolves. Each bar represents a port observed in activity, along with correlated JARM or SSL fingerprints. By hovering or zooming, analysts can track when a C2 server first appeared, when it was last active, and which encrypted fingerprints were linked to it during specific months.

In this example, ports 443, 6579, and 43211 show consistent activity, with the AdaptixC2 signature clearly visible on 43211. Seeing this progression allows threat hunters to confirm persistence, reuse of configurations, and the rollout of new servers that share identical TLS or SSH fingerprints.
Using these pivoting capabilities, Hunt.io enables analysts to move from a single AdaptixC2 indicator to a full picture of the surrounding infrastructure, revealing the scale and connections behind active campaigns. With this visibility established, the next step is translating these findings into practical detection and defense measures.
Mitigation Strategies
Network-Level Defenses: Since AdaptixC2 relies on RC4-encrypted C2 traffic and often listens on custom ports like 4321, deep packet inspection can help identify unusual encryption patterns and HTTP headers linked to its command structure. Monitor for connections to non-standard ports and recurring certificate names such as server.rsa.crt. Apply network segmentation to contain SMB-based lateral movement and block outbound communication from non-essential systems.
Host-Based Protection: AdaptixC2’s runtime API resolution and process injection techniques can evade static detection, so focus on endpoint monitoring for suspicious memory activity and unsigned binary execution. Whitelist critical applications, track BOF module loads, and monitor for unexpected service installations or registry modifications linked to persistence.
Detection and Response: AdaptixC2 operators reuse distinct HTTP headers, port combinations, and certificates across their infrastructure. Build SIEM correlation rules around these indicators and integrate behavioral detection for tunneling or multi-hop C2 communication. When detected, trigger automated response actions, isolate the host and capture forensic data for post-incident analysis.
Wrapping Up
This analysis of AdaptixC2 reveals a sophisticated yet lightweight command and control framework designed for persistent access and stealthy operations. The beacon's multi-protocol communication capabilities, advanced evasion techniques, and comprehensive system administration features make it a significant threat to organizational security. The framework's modular architecture and BOF execution system provide attackers with the flexibility to adapt their operations to specific environments and objectives.
The discovery of active infrastructure across multiple countries and hosting providers demonstrates the framework's real-world adoption and operational deployment. The identified configuration patterns and network signatures provide valuable intelligence for proactive defense and threat hunting activities. Organizations should prioritize implementing the recommended mitigation strategies and monitoring for the provided indicators to detect and respond to AdaptixC2 activities effectively.
AdaptixC2 IOCs
Below is a sample of verified servers observed during our HuntSQL™ searches, all confirmed through AttackCapture™ and host-level correlation.
IP | AttackCapture™ Data | ASN | Company | Notes |
---|---|---|---|---|
20.234.49[.]186 | AdaptixC2 | AS8075 | Microsoft Corporation | Exposed open directory |
85.202.193[.]88 | AdaptixC2 | AS39318 | PS Internet Company LLP | Exposed open directory |
144.91.103[.]204 | AdaptixC2 | AS51167 | Contabo GmbH | Exposed open directory |
185.196.10[.]96 | AdaptixC2 | AS42624 | Global-Data System IT Corporation | Exposed open directory |
166.1.160[.]69 | AdaptixC2 | AS41745 | Ace Data Centers, Inc. | Exposed open directory |
23.227.203[.]190 | - | AS29802 | HIVELOCITY, Inc. | C2 server |
Other 56 IPs | - | Multiple | Multiple | HTTP headers containing the string %AdaptixC2% |
The table above includes a sample of confirmed AdaptixC2 servers. To access the rest of the 102+ servers detected through Hunt.io’s automated C2 detection, contact our team for details.
AdaptixC2 is a command-and-control (C2) framework designed to be simple, flexible, and easily customizable. Unlike larger C2 platforms that can be complex and heavy, its lightweight design makes it easier for attackers to deploy and adapt across different environments.
The framework is modular, meaning its features can be extended or modified without requiring a complete rewrite of the system. It supports the basic functions you'd expect in a C2 tool, such as running commands on a compromised machine, transferring files, injecting into processes, setting up persistence, and gathering system information. Communication usually happens through HTTP or HTTPS, which helps it blend in with normal web traffic.
Because it's open-source, AdaptixC2 can be studied and modified by anyone, from researchers and defenders to red teamers and attackers. For defenders, it's a good example of how custom or lesser-known C2 frameworks are being used to avoid detection.

Key Takeaways
Framework: AdaptixC2 demonstrates that lightweight, open-source C2 frameworks can deliver full-featured capabilities, including multi-protocol communication, advanced evasion techniques, and modular extensibility through BOF execution systems.
Real-World Deployment Scale: The discovery of 102 active servers across multiple countries and hosting providers indicates widespread operational use, not just research or testing activities, with attackers leveraging legitimate cloud infrastructure to blend malicious operations.
Multi-Protocol Threat Model: The beacon's support for HTTP, SMB, and TCP protocols creates multiple attack vectors that require comprehensive network monitoring, as attackers can adapt communication methods based on target environment restrictions.
Detection Challenges: Dynamic API resolution, custom hash-based lookups, and RC4 encryption make traditional signature-based detection ineffective, requiring behavioral analysis and network pattern recognition for reliable identification.
Operational Security Features: Built-in capabilities like kill dates, working hours restrictions, and configurable sleep intervals demonstrate that even lightweight frameworks incorporate sophisticated operational security measures for long-term persistence.
Lateral Movement Capabilities: SMB named pipe communication and multi-hop pivoting functionality transform each infected system into a potential stepping stone for deeper network penetration, requiring network segmentation as a critical defense.
Open Source Intelligence Impact: Exposed directories with deployment scripts, configuration files, and compiled agents offer useful insight into attacker operations and support better countermeasures.
Initial Discovery via AttackCapture™
AttackCapture™ is Hunt.io's system for spotting and indexing open directories left exposed online by attackers. It collects these directories, extracts the files inside, and tags them by malware family, tool name, or known behavior. This helps analysts connect exposed files with active infrastructure and see how different frameworks, like AdaptixC2, are being used in real operations.
For our research on AdaptixC2, the first step was filtering results by the AdaptixC2 tag. This quickly revealed servers linked to the framework. We then focused on hosts with open directories, since these often hold payloads, configuration files, or C2 web panels.
Reviewing these directories gave us a clearer view of how AdaptixC2 functions and where it's being deployed. Findings pointed to servers across multiple providers and countries, including Kazakhstan, Ireland, and Switzerland, with ports such as 80, 8000, and 14531 frequently observed.

Some exposed open directories held files from a few megabytes up to more than 70 MB. These often include payloads, configuration files, or control pages that reveal how the server is set up.
While analyzing one of the AdaptixC2 servers (85.202.193[.]88), we found
.ssh/authorized_keys
(possible access keys), shell histories (
.bash_history
,
.history
,
nohup.out
), and profile files that show past commands and environment details.
We also saw deployment traces such as Dockerfile, dist/, server.log, and install scripts (
pre_install_linux_all.sh
,
pre_install_macos_client.sh
) that show how the framework was built and run.

The exposed directory also contained compiled agents and traces of day-to-day use. User and system files like
.bash_history
,
.bashrc
,
.profile
,
.wget-hsts
, and
.sudo_as_admin_successful
reveal environment setup and past activity on the host. We also found multiple compiled payloads (
agent.x64.bin
,
agent.x86.dll/.exe
,
agent.smb.exe/.dll
,
agent_noheader.exe
,
svc_agent.*
) and encoded forms (
agent.base64
,
agent.hex
).

Investigation and Analysis
Our review of the collected AdaptixC2 files and code revealed several agent components that shed light on the framework’s client-side behavior. The analysis centered on the beacon, the malware responsible for establishing command and control on infected systems, where we identified seven key capability areas that define how AdaptixC2 operates in the wild.
Multi-Protocol Communication
The beacon implements three different communication methods to establish command and control channels with remote operators. The HTTP method uses standard web traffic with custom headers and URIs to blend in with normal browsing activity, while supporting multiple backup servers for redundancy.
For internal network operations, it creates SMB named pipes between infected machines, allowing commands to pass through compromised systems without generating external traffic. The TCP option provides direct socket connections when HTTP traffic is blocked, listening on configurable ports with a custom protocol implementation.
Advanced Evasion Techniques
The malware avoids static API imports by resolving Windows function addresses at runtime using custom hash-based lookups, making signature detection significantly harder. It supports multiple deployment methods, including standalone executables, Windows services, DLL injection, and shellcode execution, providing flexibility to bypass different security controls and persistence mechanisms.

System Administration Capabilities
The beacon provides comprehensive remote administration through an extensive command set that includes complete file system operations like directory listing, file reading, copying, and deletion. It also offers process management capabilities, allowing attackers to list running applications, terminate processes, and execute new programs with full output capture for interactive system control.

File Transfer Functionality
The malware implements robust file transfer capabilities supporting both uploads and downloads through encrypted channels. Downloads use a chunked transfer system that breaks large files into smaller pieces with resume capability, helping avoid network monitoring alerts while ensuring reliable transfer completion even over unstable connections.

Networking and Lateral Movement
The beacon includes sophisticated tunneling and pivoting functionality that transforms infected systems into proxy servers for deeper network penetration. It implements TCP and UDP port forwarding to route traffic through compromised machines and supports multi-hop connections where commands pass through multiple infected systems to reach targets that cannot directly communicate with external C2 servers.
BOF Execution System
The malware features a Beacon Object File system that allows loading and executing additional modules without recompilation. This modular architecture provides loaded modules with a complete API for system interaction, memory management, and output handling, essentially creating a platform for arbitrary code execution and functionality extension.

Configuration Management
The beacon includes several operational security features designed for long-term persistence and stealth operations. It supports kill dates for automatic termination, working hours restrictions to blend with normal business operations, and configurable sleep intervals with random jitter to evade network monitoring. All communications use RC4 encryption with session-specific keys to protect command and control traffic from analysis.

Infrastructure Discovery and Hunting
After understanding the beacon's internal functions, we shifted focus to the infrastructure that supports it. Using configuration profiles and live telemetry from Hunt.io, we mapped active AdaptixC2 servers and analyzed how they operate across hosting providers.
Configuration Profile Discovery
During our investigation, we found a configuration profile for an AdaptixC2 teamserver that gave us several useful leads. The profile shows the server listening on 0.0.0.0:4321 with an /endpoint path, default credentials, certificate names (server.rsa.crt and server.rsa.key), and a list of enabled extenders (HTTP, SMB, TCP, Gopher). It also includes token lifetimes, a custom server header, version string (v0.8), and templates for callbacks such as new agent registration or file downloads.

Infrastructure Fingerprinting
These details are valuable for tracking infrastructure. The ports and endpoints guide network searches, certificate names reveal file locations in exposed webroots, and headers or version strings provide a fingerprint to link multiple hosts. We exported these indicators into Hunt.io's index and used them to map related AdaptixC2 servers across the internet.
HuntSQL™ Query for AdaptixC2 Detection
We noticed the HTTP response header Server: AdaptixC2, which is a very useful fingerprint. Because that header is returned by the server, we can pivot from any host that shows it: search web server headers, proxy/WAF logs, passive DNS, or service scans for matches, and pull associated files and connection logs.
In this case, we crafted a HuntSQL™ query searching for HTTP headers containing the string %AdaptixC2%, allowing us to identify servers returning that value in their responses.
SELECT
ip
FROM
httpv2
WHERE
http.headers.bytes.content LIKE '%AdaptixC2%'
AND timestamp gt '2025-09-20'
Copy
The results revealed 56 active hosts returning the Server: AdaptixC2 header, confirming live infrastructure tied to the framework. Several of these servers were hosted on well-known providers, suggesting attackers rely on commercial cloud environments to run their C2 operations.

This query returns hosts matching the AdaptixC2 pattern and can be extended for certificate or JARM correlation, helping uncover additional servers with shared infrastructure traits. Building on these results, we expanded the search across Hunt.io’s dataset to identify broader AdaptixC2 activity and confirm patterns observed in earlier findings.
Automated Hunting
Filtering Hunt.io's C2 telemetry for the AdaptixC2 tag surfaced 102 active servers across several hosting providers. Most were hosted on Hivelocity, OVHcloud, and Constant Company, showing that attackers rely on legitimate cloud infrastructure to hide their activity among regular business traffic. Counts reflect AttackCapture™ and HuntSQL™ results collected between August and September 2025.
Port analysis confirmed that 4321 is the default listening port for AdaptixC2 teamservers, with 6869 and 53362 seen in custom setups or parallel listeners. These findings reinforce the configuration data seen earlier and provide reliable starting points for detection and blocking.

With this infrastructure mapped, the next step was to explore how analysts can pivot within Hunt.io to uncover related servers, shared certificates, and broader connections across the same attacker ecosystem.
Pivoting and Correlation in Hunt.io
Once analysts obtain this AdaptixC2 infrastructure listing in Hunt.io, they can pivot directly from the displayed fields to expand the investigation and uncover related infrastructure controlled by the same threat actor. For example, by pivoting from one of the identified IPs - 23.227.203[.]190 - analysts can explore provider details, risk scores, and open ports to understand how this C2 node fits within the broader AdaptixC2 network.

The Info tab shows provider details, risk level, and open ports. Analysts can confirm if the host is active, review services like TLS or SSH, and check non-standard ports such as 4321 that often appear in AdaptixC2 deployments.
The Domains tab lists hostnames tied to the IP. This helps reveal automatically generated subdomains or control panels that attackers might use for redirection or management.
In the Associations tab, Hunt.io displays all linked SSL certificates, keys, and configuration files. Matching certificates across several IPs is one of the quickest ways to connect multiple C2 servers operated by the same group. In this example, identical certificate fingerprints were found across several Hivelocity IPs, confirming shared infrastructure within the same AdaptixC2 cluster.

The Pivots view brings these findings together. It lists hashes, headers, and TLS fingerprints that can be queried or expanded through HuntSQL™. Analysts can search by SSL fingerprint, header hash, or JARM signature to uncover other hosts with the same traits. This pivoting ability helps build a clear map of how attackers distribute and reuse their C2 nodes.

Timeline and IOC Correlation
The Timeline / IOCs view helps analysts understand how the AdaptixC2 infrastructure evolves. Each bar represents a port observed in activity, along with correlated JARM or SSL fingerprints. By hovering or zooming, analysts can track when a C2 server first appeared, when it was last active, and which encrypted fingerprints were linked to it during specific months.

In this example, ports 443, 6579, and 43211 show consistent activity, with the AdaptixC2 signature clearly visible on 43211. Seeing this progression allows threat hunters to confirm persistence, reuse of configurations, and the rollout of new servers that share identical TLS or SSH fingerprints.
Using these pivoting capabilities, Hunt.io enables analysts to move from a single AdaptixC2 indicator to a full picture of the surrounding infrastructure, revealing the scale and connections behind active campaigns. With this visibility established, the next step is translating these findings into practical detection and defense measures.
Mitigation Strategies
Network-Level Defenses: Since AdaptixC2 relies on RC4-encrypted C2 traffic and often listens on custom ports like 4321, deep packet inspection can help identify unusual encryption patterns and HTTP headers linked to its command structure. Monitor for connections to non-standard ports and recurring certificate names such as server.rsa.crt. Apply network segmentation to contain SMB-based lateral movement and block outbound communication from non-essential systems.
Host-Based Protection: AdaptixC2’s runtime API resolution and process injection techniques can evade static detection, so focus on endpoint monitoring for suspicious memory activity and unsigned binary execution. Whitelist critical applications, track BOF module loads, and monitor for unexpected service installations or registry modifications linked to persistence.
Detection and Response: AdaptixC2 operators reuse distinct HTTP headers, port combinations, and certificates across their infrastructure. Build SIEM correlation rules around these indicators and integrate behavioral detection for tunneling or multi-hop C2 communication. When detected, trigger automated response actions, isolate the host and capture forensic data for post-incident analysis.
Wrapping Up
This analysis of AdaptixC2 reveals a sophisticated yet lightweight command and control framework designed for persistent access and stealthy operations. The beacon's multi-protocol communication capabilities, advanced evasion techniques, and comprehensive system administration features make it a significant threat to organizational security. The framework's modular architecture and BOF execution system provide attackers with the flexibility to adapt their operations to specific environments and objectives.
The discovery of active infrastructure across multiple countries and hosting providers demonstrates the framework's real-world adoption and operational deployment. The identified configuration patterns and network signatures provide valuable intelligence for proactive defense and threat hunting activities. Organizations should prioritize implementing the recommended mitigation strategies and monitoring for the provided indicators to detect and respond to AdaptixC2 activities effectively.
AdaptixC2 IOCs
Below is a sample of verified servers observed during our HuntSQL™ searches, all confirmed through AttackCapture™ and host-level correlation.
IP | AttackCapture™ Data | ASN | Company | Notes |
---|---|---|---|---|
20.234.49[.]186 | AdaptixC2 | AS8075 | Microsoft Corporation | Exposed open directory |
85.202.193[.]88 | AdaptixC2 | AS39318 | PS Internet Company LLP | Exposed open directory |
144.91.103[.]204 | AdaptixC2 | AS51167 | Contabo GmbH | Exposed open directory |
185.196.10[.]96 | AdaptixC2 | AS42624 | Global-Data System IT Corporation | Exposed open directory |
166.1.160[.]69 | AdaptixC2 | AS41745 | Ace Data Centers, Inc. | Exposed open directory |
23.227.203[.]190 | - | AS29802 | HIVELOCITY, Inc. | C2 server |
Other 56 IPs | - | Multiple | Multiple | HTTP headers containing the string %AdaptixC2% |
The table above includes a sample of confirmed AdaptixC2 servers. To access the rest of the 102+ servers detected through Hunt.io’s automated C2 detection, contact our team for details.
Related Posts:
Get biweekly intelligence to hunt adversaries before they strike.
Hunt Intelligence, Inc.
Get biweekly intelligence to hunt adversaries before they strike.
Hunt Intelligence, Inc.
Get biweekly intelligence to hunt adversaries before they strike.
Hunt Intelligence, Inc.